Security Analytics
Correlate security event streams from logs, network traffic, and authentication systems using SQL. RisingWave surfaces threat patterns within milliseconds, without the batch processing delays of traditional SIEM pipelines.
Why Streaming Detection
Batch-based SIEM systems index logs after collection, introducing minutes or hours of detection latency. By then, an attacker has completed lateral movement or exfiltrated data. Streaming event correlation evaluates threat patterns against every security event as it arrives, enabling detection at the speed of the attack.
| Factor | Traditional SIEM | RisingWave |
|---|---|---|
| Detection Latency | Minutes to hours (batch index) | Sub-second (streaming) |
| Correlation Logic | SPL/KQL queries on indexed data | Continuous SQL over live streams |
| Infrastructure | Log shipper + SIEM cluster | Single SQL system |
| Multi-Source Rules | Separate collection pipelines | Unified SQL joins across sources |
Use Cases
Any attack pattern that produces a sequence of detectable events across security log streams. Brute force attempts, lateral movement, privilege escalation, and data exfiltration all leave correlated event traces that SQL window aggregations can detect as they unfold.
Detect authentication failure velocity exceeding threshold per user or IP within rolling time windows using SQL COUNT aggregations over authentication event streams from Okta, Active Directory, or custom auth systems
Correlate authentication events across multiple internal hosts within time windows to identify lateral movement patterns, joining authentication logs with network topology data to flag unusual access paths
Alert when standard user accounts perform privileged operations by joining live authentication streams with role and permission tables updated via CDC, detecting escalation within seconds of the first privileged action
Surface unusual outbound data volume, access to sensitive file paths outside normal working hours, or bulk database queries by correlating network flow, file access, and database audit log streams in a single SQL rule
How It Works
RisingWave ingests security event streams from Kafka log pipelines and continuously evaluates SQL-defined detection rules using materialized views. Threat signal state, including failure counts, accessed hosts, and query volumes, is maintained as incrementally updated SQL results. Your SIEM, SOAR, or alerting system queries or subscribes to the threat materialized view, receiving enriched detections ready for analyst review.
Correlate security event streams in SQL and surface threat patterns within milliseconds, without the batch delays of traditional SIEM pipelines.
Start Free